Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Extracting Embedded MultiMediaCard (eMMC) contents in-system
June 20, 2025 | Dmitry Janushkevich
CONTINUE READING
SUBSCRIBE
Blog post
Diving Deep Into a Pwn2Own Winning WebKit Bug
November 26, 2019
Apple
,
WebKit
,
Research
Blog post
Thanksgiving Treat: Easy-as-Pie Windows 7 Secure Desktop Escalation of Privilege
November 19, 2019
Microsoft
,
Windows
,
Research
,
UAC
Blog post
The Little Bitmap That Could(n’t)
October 31, 2019
Microsoft
,
Fuzzer
,
Research
Blog post
CVE-2019-1306: Are you my Index?
October 24, 2019
Microsoft
,
Azure
,
Research
Blog post
CVE-2019-12643: Cisco IOS XE Authentication Bypass Vulnerability
October 18, 2019
Cisco
,
Research
Blog post
CVE-2019-8697: MacOS System Escalation Via Disk Management
October 03, 2019
Apple
,
macOS
,
Research
Blog post
CVE-2019-0801: Microsoft Office Uri Hyperlink Hijinks
September 24, 2019
Microsoft
,
Office
,
Research
Blog post
CVE-2019-1257: Code Execution on Microsoft SharePoint Through BDC Deserialization
September 19, 2019
Microsoft
,
SharePoint
,
Research
Blog post
Patch Analysis: Examining a Missing Dot-Dot in Oracle WebLogic
September 17, 2019
Oracle
,
Research
,
Security Patch
Blog post
MindShaRE: Hardware Reversing with the TP-Link TL-WR841N Router
September 03, 2019
MindshaRE
,
Belkin
,
Research
,
Reverse Engineering
keyboard_arrow_left
keyboard_arrow_right